Sciweavers

1019 search results - page 154 / 204
» Mobile media search
Sort
View
CSE
2009
IEEE
15 years 8 months ago
Bio-chaotic Stream Cipher-Based Iris Image Encryption
Conventional cryptography uses encryption key, which are long bit strings and are very hard to memorize such a long random numbers. Also it can be easily attacked by using the brut...
Abdullah Sharaf Alghamdi, Hanif Ullah, Maqsood Mah...
IICS
2009
Springer
15 years 8 months ago
Web 2.0 as an Autopoietic System - Implications for Innovative Web-Interfaces
: The Web 2.0 can be regarded as an evolutionary process of medial differentiation. Infinite online communities are emerging and disappearing. It seems that a race has started in s...
Kathrin Vent
ICIW
2008
IEEE
15 years 8 months ago
Governed Content Distribution on DHT Based Networks
Abstract—Peer-to-Peer (P2P) systems are widely used for sharing digital items without structured metadata and in absence of any kind of digital rights management applied to the d...
Walter Allasia, Francesco Gallo, Marco Milanesio, ...
ICMCS
2007
IEEE
144views Multimedia» more  ICMCS 2007»
15 years 7 months ago
Splog Detection using Content, Time and Link Structures
This paper focuses on spam blog (splog) detection. Blogs are highly popular, new media social communication mechanisms and splogs corrupt blog search results as well as waste netw...
Yu-Ru Lin, Hari Sundaram, Yun Chi, Jun'ichi Tatemu...
INEX
2007
Springer
15 years 7 months ago
Integrating Document Features for Entity Ranking
The Knowledge Media Institute of the Open University participated in the entity ranking and entity list completion tasks of the Entity Ranking Track in INEX 2007. In both the entit...
Jianhan Zhu, Dawei Song, Stefan M. Rüger